Ransomware Gang Claims to Have Hacked Amazon Ring

0
There has been a recent cyber attack on Amazon’s popular security camera company, Ring, which was attributed to a ransomware group ALPHV that uses...

Malware Campaigns Abusing Telegram Bots to Spread Rapidly

0
Numerous updates and alterations were witnessed in the major malware families employed in phishing scams during the first quarter of 2023, alongside significant variations...

Camaro Dragon Strikes with New TinyNote Backdoor for Intelligence Gathering

0
Jun 02, 2023Ravie LakshmananMalware / Cyber Threat The Chinese nation-stage group known as Camaro Dragon has been linked to yet another backdoor that's designed...

Cisco and VMware Release Security Updates to Patch Critical Flaws in their Products

0
Apr 21, 2023Ravie LakshmananSoftware Update / Network Security Cisco and VMware have released security updates to address critical security flaws in their products that...

SaaS Security Posture Management (SSPM) as a Layer in Your Identity Fabric

0
Jan 23, 2023The Hacker NewsSaaS Security / SSPM Solution The move to SaaS and other cloud tools has put an emphasis on Identity &...

Fortinet Warns of Active Exploitation of New SSL-VPN Pre-auth RCE Vulnerability

0
Dec 13, 2022Ravie LakshmananVirtual Private Network / Network Security Fortinet on Monday issued emergency patches for a severe security flaw affecting its FortiOS SSL-VPN...

Amazon Banned Flipper Zero Pentesting Tool

0
According to reports, Amazon has stopped selling Flipper Zero, one of the most widely used pentesting tools. Amazon tagged the product as a “card-skimming...

Serious Unpatched Vulnerability Uncovered in Popular Belkin Wemo Smart Plugs

0
May 17, 2023Ravie LakshmananInternet of Things / Vulnerability The second generation version of Belkin's Wemo Mini Smart Plug has been found to contain a...

AuKill Malware Kills EDR Clients To Attack Windows Systems

0
A new hacking tool, AuKill, disables Endpoint Detection & Response (EDR) software for threat actors to launch BYOD attacks by deploying backdoors and ransomware...

Hackers Abuse Legitimate Remote Monitoring Tools

0
A joint Cybersecurity Advisory (CSA) from the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing and Analysis Center (MS-ISAC)...